Ensure AWS IAM password policy does not allow password reuse
ID |
pwd_policy_reuse |
Severity |
high |
Vendor |
AWS |
Resource |
IAM (AWS Identity and Access Management) |
Tags |
reachable |
Description
Ensuring that the AWS IAM password policy does not allow password reuse is a best practice that promotes good security hygiene, reduces the risk of unauthorized access, and aligns with various compliance requirements. It is an essential step in maintaining the security and integrity of your AWS environment and protecting your sensitive data and resources.
You can set the number of previous passwords that users are prevented from reusing. |
Mitigation / Fix
Buildtime
Terraform
resource "aws_iam_account_password_policy"{
minimum_password_length = 15
require_lowercase_characters = true
require_numbers = true
require_uppercase_characters = true
require_symbols = true
allow_users_to_change_password = true
password_reuse_prevention = 24 (1)
}
1 | Ensure password_reuse_prevention is set to a high value like 24. |